Skip to main content
Eliciting Security Requirements Through Misuse Activities
IEEE 19th International Conference on Database and Expert Systems Application
  • Michael Van Hilst, Nova Southeastern University
  • Fabricio A. Braz
  • Eduardo B. Fernandez
Event Date/Location
Turin, Italy / 2008
Document Type
In previous work we introduced an approach for finding security requirements based on misuse activities (actions). This method starts from the activity diagram of a use case (or a sequence of use cases). Each activity is analyzed to see how it could be subverted to produce a misuse of information. This analysis results in a set of threats. We then consider which policies can stop or mitigate these threats. We now extend that approach to consider in the analysis the type of misuse (confidentiality, integrity ...) that can happen in each activity, the role of the attacker, and the context for the threat. This extended analysis results in a finer and more systematic way to find threats and we can identify now more threats. We also improve the way to find the policies to control these threats and we consider how to map the corresponding policies to security patterns. The information in each pattern helps in the selection of an optimal (or good) set of policies. Our extended approach can be conveniently incorporated in a methodology to build secure systems.
Citation Information
Michael Van Hilst, Fabricio A. Braz and Eduardo B. Fernandez. "Eliciting Security Requirements Through Misuse Activities" IEEE 19th International Conference on Database and Expert Systems Application (2008)
Available at: